All releases of Email Security through Procmail

Release Notes: This release added default poisoning of the application/x-msdownload MIME type in response to a new worm. Full MIME-type poisoning support will be available shortly. This release was accelerated for security reasons.

Release Notes: The unrar executable check was fixed to not test for unrar if RAR scanning is already explicitly disabled by $DISABLE_RAR_SCAN. Recipient notification now works when sanitizing on a relay (e.g. in front of an Exchange server).

Release Notes: A bug in null-boundary sanitizing was fixed. A
hanging bug in decoding some Office/ZIP
attachments to attached messages was fixed. A bug
in scanning non-base64-encoded document/zip
attachments was fixed. ZIPs are now detected by
MIME type, not just by filename. Updating to this
release is strongly recommended.

Release Notes: Unusual formatting of base64 attachments intended
to bypass filters is now detected. More HTML tags
that can be used to attack mail clients or deliver
web bugs are now defanged. Other minor bugfixes
and enhancements were made.

Release Notes: This version adds the ability to scan ZIP archive attachments
for suspicious filenames, and quarantine messages that
match. It adds the ability to use CPAN modules for some tasks
instead of external programs. There were minor bugfixes and
other enhancements.

Release Notes: The Smart Sender Notification Suppression was made
a bit smarter. See SECURITY_TRUSTED_MTAS in the
Configuration documentation for more details. The
DISCARD and NOTIFY tie-in was fixed, so it can now
DISCARD without notifying. .tmp files are now
cleaned up on mimencode failure. Updating to this
version is highly recommended, as it will not
respond to forged NovArg/MyDoom attack messages.